|
by Van Wyk, Kenneth R., Graff, Mark G., Peters, Dan S., Burley, Diana L.
Published 2015
Table of Contents:
“... -- Testing activities -- Deployment and integration -- Operating software securely -- Maintaining software...”Published 2015
Addison-Wesley
|
by Ransome, James F., Misra, Anmol, Schoenfield, Brook S. E.
Published 2014
“..."This book outlines a step-by-step process for software security that is relevant to today...”Published 2014
CRC Press, Taylor & Francis Group